Concluded Webcasts

This one-hour presentation will separate the hype from the facts regarding ongoing foreign intrusions into government networks and the targeting of government employees. It will also provide practical advice on how to protect yourself and your organization from the actors orchestrating these intrusions. Topics to be covered include:

An overview of the variety of attacks and targets that are ongoing today including the Advanced Persistent Threat

What types of attacks can and cannot be defended against

A three-part defensive strategy that you can implement today

A 30-minute presentation will be followed by a 30 minute Q and A session.

Jeffrey Carr is the CEO of GreyLogic.us, the founder and principal investigator of Project Grey Goose, and the author of Inside Cyber Warfare: Mapping the Cyber Underworld (O'Reilly Media, 2009). Mr. Carr regularly consults with agencies of the U.S. Intelligence Community (IC) on Russian and Chinese cyber warfare strategy and tactics as well as new and emerging threats to Critical Infrastructure.

Spear Phishing: A Smarter and More Dangerous Social WebPresented by: Jeff Jonas - May 6, 2010

This one hour webcast will be a future-looking forecast about targeted attacks on identity, email, and data on the Internet. What happens when every ad doesn't feel like spam because of increased information sharing and improving analytics? Spear phishing is the next-generation of e-mail phishing--except citizens, companies, and governments are the very precise targets with realistic ads. This discussion will discuss what technology makes this possible, the recruitment for illegal activities (including corporate espionage), and how to avoid becoming a spear phishing victim.

A 30-minute presentation will be followed by a 30 minute Q and A session.

Jeff Jonas is Chief Scientist, IBM Entity Analytics Group and an IBM Distinguished Engineer. He designs next generation technology that helps organizations better leverage their enterprise-wide information assets. With particular interest in real-time "sensemaking" these innovative systems fundamentally improve enterprise intelligence which makes organizations smarter, more efficient and highly competitive. Jonas is a Member of the Markle Foundation Task Force on National Security in the Information Age, a Board Member of the US Geospatial Intelligence Foundation (USGIF), on the EPIC Advisory Board, a Senior Associate at the Center for Strategic and International Studies (CSIS), and a Distinguished Engineer of Information Systems (adjunct) at Singapore Management University. He also periodically testifies on privacy and counterterrorism in such venues as the Department of Homeland Security’s Data Privacy and Integrity Advisory Committee, and other federally convened commissions.

The shortage of qualified cyber security professionals is a real and immediate concern for all levels of government. Lewis Shepherd of Microsoft Research is right in the thick of this discussion and has been thinking about this problem for a while. Join him in a free 60-minute webcast.

A 30-minute presentation will be followed by a 30 minute Q and A session.

Lewis Shepherd is the Chief Technology Officer of Microsoft’s Institute for Advanced Technology in Governments, having joined Microsoft in 2007. He has degrees from Stanford University (where he was a Rockefeller Graduate Fellow), the University of Virginia, and the Université Libre de Bruxelles (Belgium). He has also been a guest-lecturer at the Stanford Graduate School of Business for MBA courses on government/business relations. Lewis spent two decades working in and around Silicon Valley, but after the 9/11 attacks he focused on technologies to support the Intelligence Community and in 2003 accepted an offer to become Senior Technology Officer at the Defense Intelligence Agency, where he spent four years participating in a remarkable period of innovation and reform for the intelligence community.

Cloud Computing and Security: Can't We all Just Get Along?Presented by: Bernard Golden - May 19, 2010

Security is considered the primary barrier to cloud computing adoption. Therefore, focusing attention toward minimizing security risks offers the potential for increasing cloud computing adoption. This one-hour presentation will offer a framework to analyze security issues, and present a set of best practices toward implementing security in cloud-based applications.

A 30-minute presentation will be followed by a 30 minute Q and A session.

Bernard Golden Bernard Golden is called a "cloud guru." He is CEO of HyperStratus, a Silicon Valley cloud consulting firm that helps its clients plan, design, and implement cloud initiatives. HyperStratus clients include the Silicon Valley Education Foundation, HelloWallet, Sun Microsytems, and Hewlett-Packard. Bernard is the Cloud Computing Advisor for CIO Magazine. His widely-read CIO.com blog on cloud computing has been called "brilliant and incisive." His blog's influence was recognized when it was named a "Top 25 Cloud Computing Blog" by CloudTP.

Program Chair:

Laurel Ruma
Laurel Ruma is the Gov 2.0 Evangelist at O'Reilly Media. She joined the company in 2005 after working for five years at various IT analyst firms in the Boston area. Laurel is also co-chair for the Gov 2.0 Expo and co-editor of Open Government, published by O'Reilly in February 2010.